Recent DTS Blog Posts
…of Service – Being Incredible By Going Over The Top
…of service is going beyond mere courteous behavior. It’s going beyond helpfulness. It’s being mindful. It’s being courageous and brave. It’s sticking yourself out there. It’s being bold and dedicated to the delivery of service. It’s going far beyond anything expected.
Different Types of CASB Solutions
Cloud Access Security Broker (CASB) solutions are essential for organizations looking to secure their data in the cloud. These solutions provide visibility and control over the use of cloud services, ensuring that sensitive data is protected from potential threats. In this blog, we’ll explore the different types of CASB solutions available and their unique features. CASB solutions work as a gatekeeper between on-premises infrastructure and cloud services to monitor and govern how data is accessed or moved to cloud applications.
A Beginner’s Guide to Cyber Security
Cyber security is important for every business, but it can be a bit daunting if you’re not familiar with the topic. In this blog post, we’ll break down the basics of cyber security and what steps you can take to become more knowledgeable about it.
Security First – Audit AD Privileged Access
Increase Your Data & User Security Posture Using Geo-Fencing Conditional Access Policies.
Security First – Implement Azure Geo-Fencing
Increase Your Data & User Security Posture Using Geo-Fencing Conditional Access Policies.
How to Prevent Exposure Of Sensitive Email Content
Video: Find out how to secure your Microsoft Office 365 email and prevent exposure of sensitive email content.
DOT NET TLS BEHAVIOR SECRETS
This article includes critical & important relationship dependencies on how exactly DOT NET (.NET) compiled applications function with and along side TLS. For non-developers, you most certainly will find this article extremely helpful in how we disentangle multiple hidden secrets and dependencies between DOT NET Apps + TLS.
AN UNTHINKING HIRING MACHINE – PART I
Part I – Detailed history of an Artificial HIRING RULE that became the basis of AN UNTHINKING HIRING MACHINE causing widespread trouble.
Recruitment Practices – Resume Length Wins Over Health
This article is intended for jobseekers tackling the question whether resume length wins out over health. Is resume length more important?
TLS Behavior – .NET 3.5x & 4.7 Apps
Security First Approach, this article answers addition hidden TLS behavior mysteries relating to .NET Framework 3.5x & 4.7 compiled Apps, and what to expect.
O365 Sensitivity Labels – Dynamic Content Marking
When configuring content marking for a sensitivity label, you can now use the dynamic variables.
AN UNTHINKING HIRING MACHINE – PART II
Part II – Detailed history of an Artificial HIRING RULE that became the basis of AN UNTHINKING HIRING MACHINE causing widespread trouble.
VIDEO: Office 365 & Enterprise Security Fundamentals
Security Fundamentals for securing Office 365 Data, Passwords, Management and other important areas.
TECHNICAL RECRUITEMENT LEFTOVERS
The following is the biggest open secret within the technical recruitment, IT outsourcing, industry. This also happens to be a self inflicted wound, double edge sword, that has been left to fester and snow ball for over a decade. Bon Appetit!
Remote Workforce Security Strategy
There has been a notable growth and obvious demand for IT business executives and security strategy experts (CISO) to rapidly research…
NEW VIDEO: Hidden Cost Saving Project Tips
Hidden-Cost Saving Fundaments – There are fundamental, critical, cost saving elements which comprises any project, that when…
Implement Data Loss Prevention (DLP)
Prevent Data Leakage – Implement compliance to ensure your business properly aligns with business standards and industry regulations.
Happy New Year – Rising Above…
Placing attention on, further supporting, positive and productive action(s) may be the only known method of improving my own disposition and actions.
Password Writeback Alerting – Log Analytics Use-Case
Alert on Password Writeback Outage I'm taking a break from a busy schedule to begin writing a series of...
IT Recruitment Professionals – Your Resource Selection
Our President Speaks On Cost Saving Tips For IT Resource Selection Hear how DTS President, Colleen, helps...
VIDEO: 3 Simple Tips: Designing Cyber Security Solutions
In Cyber Security, there are 3 simple actions anyone can take, no matter their field or position, to design a solution. In particular, these tips can be put to use to marketed improve any scene.
Reduce IT Cost and Improve Efficiencies
Our Principal Architect Dynamic Technical Solutions' Owner and Principal Architect, Shawn May provides...
Technical Tip – Email Phishing Prevention – Reduce Attack Surface
Email Phishing Prevention Email Phishing Prevention is a very real thing, and certainly something IT...
Azure Self Service Password Reset
Quick call out to businesses using or considering Microsoft's Self Service Password Reset (SSPR). Just to...
TLS Remediation – Uncovered
SECURITY – TLS Remediation – The article answers the question “HOW BEST TO ACCOMPLISH ENERPRISE TLS REMEDIATION”.
VAMPIRE PERSONALITIES & TODAY’S WORKFORCE
Man is that spark which ignites the flame in our society. Man imbues life into this world through action. Whether we’re talking about a painter…
Choosing The Right IT Professional
Professionalism is relentless dedication towards a task, job, project, cause or even a loved one or group. It wouldn’t necessarily
How To Make A Healthy Resume Really Shine
Skills For A ResumeThis article concerns Skills For A Resume. What are the key differences between...
TALENT APTITUDE – SUCCESS FACTORS – PART I
Aptitude isn’t merely a fancy or colorful word. Aptitude is that magic spark which ignites innovation, creates accomplishment, overcomes impossible feats, solves intricate problems and makes things go right. Bar none, this magnificent ability can be found within us all.
TALENT APTITUDE – SUCCESS FACTORS – PART II
Second Part Of A Two Article Series – What is that magic spark which ignites innovation, creates accomplishment, overcomes impossible feats, solves intricate problems and makes things go right. Bar none, this magnificent ability can be found within us all.
Separation Of Duties through a key hole
A Discussion on Security ImprovementsFor decades, businesses have sloppily adopted and implemented haphazard...
Security: Separation of Duties & MFA – Part 1
Security Brain Dump - Part 1 of 3 From numerous security discussions, below is a rapid brain dump of...
Operationalize & Normalize System Patching
As a high priority, patch-cycles should be routinely and religiously performed. Traditional patch-cycles represent low risk, and should (as best practices) be tested within Lab.
AzureAD: PowerShell Management Change
Hey guys, Wanted to share an interesting change to the Azure AD. You all probably already know that...
Office 365: Proper Scoping
A successful Office 365 migration should not require “learning by the school of hard knocks” or “trial and...
Office 365: Actual Impact
Proactively researching best methods, practices and approach(es) to successfully transition a business to...
Office 365: Key Decision Points
A successful implementation of Office 365 begins with proper strategic planning and alignment. Planning...
Office 365: Requirements Gathering
Whether located on-premises or in the cloud, today's business relies on data and email collaborative...
Mergers & Acquisitions: Email Services
Business mergers and acquisitions are a key component in the future growth and prosperity for all companies...
Merging Email Services is Far More Streamlined Today
Whether or not both parent and child business entities utilize cloud or on-premises technology for email...
Executive Summary: Architecting and Engineering
If you’re reading this, you are probably looking at transitioning your business’ email service to an online...
Active Directory Recycling Bin
Be certain to enable your Active Directory recycling bin as soon as humanly possible. This is a simple effort which will help those involved in Active Directory sleep better at night.
Azure Security & On-Prem Active Directory (behind the scenes)
Enterprise Auth(n) SolutionsWith Microsoft’s Active Directory stepping up to the plate as the preferred and...
Do your emails arrive?
Take a peek under the hood...In today's digital communication market, there are vast numbers of germane...
Hybrid Deployment
Good morning!! Me again with some quick and helpful tips to consider how to manage or deploy cloud...
Automating Archives – Exchange Online
Good afternoon, I wanted to take a moment to touch on a hot topic concerning Exchange Online inplace...
TLS Encryption – Securing Email Communications
This article addresses the the topic of TLS Encryption – Securing Email Communications, along with the surge of questions and interest concerning ‘security’. Additionally, this article further covers other important details on securing sensitive data transmitted within an email message.
Email Archiving & Retention – A Bigger Picture
I wanted to take a moment to share an interesting acquisition scenario which was skillfully pulled out of...
NT LAN Manager (NTLM) Remediation
Security First Approach: Remediate NT LAN Manager (NTLM) is your immediate Microsoft environment today. Providing basics how to remedy critical security settings.